First published: Fri Jun 17 2016(Updated: )
A vulnerability in 389-ds-base was found that allows to bypass limitations for compare and read operations specified by Access Control Instructions. When having LDAP sub-tree with some existing objects and having BIND DN which have no privileges over objects inside the sub-tree, unprivileged user can send LDAP ADD operation specifying an object in (supposedly) inaccessible sub-tree. The returned error messages discloses the information when the queried object exists having the specified value. Attacker can use this flaw to guess values of RDN component by repeating the above process. Upstream commit: <a href="https://github.com/389ds/389-ds-base/commit/0b932d4b926d46ac5060f02617330dc444e06da1">https://github.com/389ds/389-ds-base/commit/0b932d4b926d46ac5060f02617330dc444e06da1</a>
Affected Software | Affected Version | How to fix |
---|---|---|
389 Directory Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1347760 is considered to be high due to the potential for privilege escalation.
To fix REDHAT-BUG-1347760, apply the latest patches and updates for the 389-ds-base software.
Administrators using the 389-ds-base software can be affected by REDHAT-BUG-1347760 if access control policies are not correctly configured.
Attackers may exploit REDHAT-BUG-1347760 to bypass access controls, allowing unauthorized read and compare operations on LDAP entries.
The main cause of REDHAT-BUG-1347760 is a flaw in the access control implementation of the 389-ds-base that allows unauthorized users to bypass restrictions.